nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A brief history of cryptography
|
Davies, Donald |
|
1997 |
2 |
2 |
p. 14-17 4 p. |
artikel |
2 |
Authentication using cryptography
|
Mitchell, Chris |
|
1997 |
2 |
2 |
p. 25-32 8 p. |
artikel |
3 |
Cryptographic security in the internet protocol suite: Practice and proposals
|
Zaba, Stefek |
|
1997 |
2 |
2 |
p. 54-73 20 p. |
artikel |
4 |
Elliptic curve cryptosystem — The answer to strong, fast public-key cryptography for securing constrained environments
|
Vanstone, Scott A |
|
1997 |
2 |
2 |
p. 78-87 10 p. |
artikel |
5 |
Introduction
|
Hardy, Gary |
|
1997 |
2 |
2 |
p. 1-2 2 p. |
artikel |
6 |
Introduction to cryptology
|
Piper, Fred |
|
1997 |
2 |
2 |
p. 10-13 4 p. |
artikel |
7 |
MACs and hash functions: State of the art
|
Preneel, Bart |
|
1997 |
2 |
2 |
p. 33-43 11 p. |
artikel |
8 |
Microsoft CryptoAPI
|
Fuchsberger, Andreas |
|
1997 |
2 |
2 |
p. 74-77 4 p. |
artikel |
9 |
Quantum cryptography: Protecting our future networks with quantum mechanics
|
Phoenix, Simon J.D. |
|
1997 |
2 |
2 |
p. 88-97 10 p. |
artikel |
10 |
Report highlights
|
|
|
1997 |
2 |
2 |
p. 3-9 7 p. |
artikel |
11 |
The data encryption standard
|
Coppersmith, Don |
|
1997 |
2 |
2 |
p. 22-24 3 p. |
artikel |
12 |
The difficulty of attacking cryptosystems
|
Murphy, Sean |
|
1997 |
2 |
2 |
p. 18-21 4 p. |
artikel |
13 |
The management of symmetric keys
|
Halliden, Paul |
|
1997 |
2 |
2 |
p. 44-53 10 p. |
artikel |